WHY R9B TAKES A PROACTIVE AND ‘ACTIVE ADVERSARY PURSUIT’ APPROACH TO CYBERSECURITY

WHY R9B TAKES A PROACTIVE AND ‘ACTIVE ADVERSARY PURSUIT’ APPROACH TO CYBERSECURITY

THE TECH REPUBLIC - MICHAEL KASSNER
MAY. 11, 2018

Using passive technology is not enough to defeat cyberattackers, according to the experts at root9B (R9B)–active adversary pursuit is required.

Military speak is no longer reserved for members of the world’s armed forces—terms like attack surface and kill chain are now being promoted by commercial cybersecurity experts with good reason. Simply put, very little—with the possible exception of scale—differentiates a cyber conflict between nation states and one between businesses and cybercriminals.

Eric Hipkins, a security and intelligence professional with over 25 years of experience in the military and National Security Agency, is one such expert. When asked why adversaries seem to be having their way with over 1,700 major data breaches reported in 2017, Hipkins suggests current technology-based cyber defenses are unable to stave off attacks because:

  • Cyberattack tools and techniques have evolved well beyond the capacity of existing cybersecurity platforms;
  • Attackers can study and develop tools and methodology that evade passive defenses;
  • Adversaries understand it is unlikely they will face an active human defender; and
  • Once the network perimeter has been penetrated, the attackers will likely have uncontested movement within the victim’s network.

This article was originally posted by The Tech Republic.  Click here to view on their site.